Short notes on security risk assessment

Assignment Help Term Paper
Reference no: EM13786466

Security Risk Assessment

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

Select either Google Docs/Gmail or Office 365 as the SaaS provider.

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.

Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.

Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Rationale

This assessment will cover the following objectives:

Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;

Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;

Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;

Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;

Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM13786466

Questions Cloud

Write a three page paper about interview a graduate student : Write a three page paper about Interview a graduate students whose major is master science of marketing/ social media.
Psychological intervention programs : How are psychological intervention programs effective in increasing self-confidence, focusing attention, energizing effort, and enhancing athletic performance?
Define what a premise and conclusion are : With regard to argumentation, define what a premise and conclusion are. She is from Minnesota, so we know that she is nice. How can the paper be due today? Today is Tuesday
Considering investing the entire amount for five years : GRP Corporation has $500,000 in a bank account paying 0.35% annual interest. As an alternative to leaving the money in the account, the company is considering investing the entire amount for five years. Five possible investments have been identifi..
Short notes on security risk assessment : Security Risk Assessment
Minimize ethical concerns related to social activities : Travon is the lead counselor in a small clinic. Elliot has worked there for a few years and reports to Travon. Travon completes Elliot's yearly evaluation and oversees his work. Although Travon is the supervisor, Elliot is actually three years old..
How crimes are measured : How Crimes are Measured. Utilize FBI Uniform Crime Report data and select one offense, such as burglary, in two metropolitan areas
How does an editor differ from a peer reviewer : How does an editor differ from a peer reviewer? Use at least two points to support your response. Based on this information, explain whether your article for this week was peer reviewed?
Welfare programs and policies in the american human services : what would we do without them? Consider the effectiveness of policies for social security benefits, medical care, and food vouchers.

Reviews

Write a Review

Term Paper Questions & Answers

  Analyze current health care delivery structure in your state

Analyze the current health care delivery structure in your state and compare and contrast the major determinants of healthcare market power.

  Individual formal research report based

Individual formal research report based around any one of the current business issues discussed during LB5214 (executive summary; background; and aspects /issues/problems sections are each to be under 150 words.

  Singaporean ceo educated in sydney

Lee Bineesh is a highly qualified but aggressive Singaporean CEO educated in Sydney who has just taken over as CEO of a company we shall call VRD Industries located in Singapore.

  Discuss the evolution of america''s political thought

Discuss the evolution of America's political thought as we moved from the first Federalist administration of Washington through the administration of Adams

  Significance of making critical evaluations of news stories

Write down the 700 words or more paper clarifying significance of making critical evaluations of news stories. Use the following questions to develop paper.

  In crisis and reform

Research paper examines the effectiveness of approaches that have been employed to realize correctional objectives, including some relatively recent approaches.

  Primary purpose of research writing is to..

THE PRIMARY PURPOSE OF RESEARCH WRITING IS TO….THE SINGLE MOST IMPORTANT STEP IN THE RESEARCH PROCESS IS. . .,AN EXAMPLE OF A CREDIBLE SECONDARY SOURCE TO BE USED FOR RESEARCH IS. .

  What developmental theories did you find,were applicable

Based on your course readings what developmental theories did you find that were applicable? Explain how the life-span perspective provides a way of better understanding the research reviewed.

  Effect of the whistleblowers actions

Details of the issue that the whistleblower reported and the effect of the whistleblower's actions on both the whistleblower himself and the company.

  Why pick each specific technology in the solution

Now the executive board is charging the IT department to work out a solution to integrate the overall IT systems in the company. The board is also interested in getting more inputs from customers of their toy.

  Explain the popularity and appeal

Explain the popularity and appeal of Susanna Rowson's novel, Charlotte Temple upon its publication in 1791. How did Rowson seek to disarm readers who may be suspicious of the moral utility of reading fiction

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd